ADCSync – Use ESC1 To Perform A Makeshift DCSync And Dump Hashes
This is a tool I whipped up together quickly to DCSync utilizing ESC1. It is quite slow but otherwise an...
This is a tool I whipped up together quickly to DCSync utilizing ESC1. It is quite slow but otherwise an...
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more...
Python partial implementation of SharpGPOAbuse by@pkb1s This tool can be used when a controlled account can modify an existing GPO...
CloudRecon Finding assets from certificates! Scan the web! Tool presented @DEFCON 31 Install ** You must have CGO enabled, and...
This program is a tool written in Python to recover the pre-shared key of a WPA2 WiFi network without any...
Zero-dollar attack surface management tool featured at Black Hat Arsenal 2023 and Recon Village @ DEF CON 2023. Description Easy...
A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning Features login panel Scanning for multiple hosts...
This is a tool designed for Open Source Intelligence (OSINT) purposes, which helps to gather information about employees of...
Bugsy is a command-line interface (CLI) tool that provides automatic security vulnerability remediation for your code. It is the community...
WebCopilot is an automation tool designed to enumerate subdomains of the target and detect bugs using different open-source tools. The...
A stealth post-exploitation container. Introduction With the raise in popularity of offensive tools based on eBPF, going from credential stealers...
CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester....
Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the...
Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for...
Demonized Shell is an Advanced Tool for persistence in linux. Install git clone https://github.com/MatheuZSecurity/D3m0n1z3dShell.gitcd D3m0n1z3dShellchmod +x demonizedshell.shsudo ./demonizedshell.sh One-Liner Install...
PhantomCrawler allows users to simulate website interactions through different proxy IP addresses. It leverages Python, requests, and BeautifulSoup to offer...
Overview RansomwareSim is a simulated ransomware application developed for educational and training purposes. It is designed to demonstrate how ransomware...
Have you ever watched a film where a hacker would plug-in, seemingly ordinary, USB drive into a victim's computer and...
KnowsMore officially supports Python 3.8+. Main features Import NTLM Hashes from .ntds output txt file (generated by CrackMapExec or secretsdump.py)...
A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors. About Thank you to @albinowax, @defparam and @d3d else this...
Pantheon is a GUI application that allows users to display information regarding network cameras in various countries as well as...
Little AV/EDR Evasion Lab for training & learning purposes. (️ under construction..) ____ _ _____ ____ ____ ___ __ _____...
A variation of ProcessOverwriting to execute shellcode on an executable's section What is it For a more detailed explanation you...
Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only)....